Protecting Cryptographic Keys against Continual Leakage
From MaRDI portal
Publication:3582747
DOI10.1007/978-3-642-14623-7_3zbMath1280.94073OpenAlexW1494600236MaRDI QIDQ3582747
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_3
Related Items (16)
How to Compute in the Presence of Leakage ⋮ Fully Homomorphic Encryption with Auxiliary Inputs ⋮ Fully leakage-resilient signatures ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience ⋮ Post-challenge leakage in public-key encryption ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ Efficient Leakage Resilient Circuit Compilers ⋮ Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Identity-based broadcast encryption with continuous leakage resilience
This page was built for publication: Protecting Cryptographic Keys against Continual Leakage